Kal-OS is intended for computers built by KCI. The OS is not provided nor distributed to any other system. To keep with this requirement, there will be a special chip that Kal-OS will look for during installation. If it doesn’t find the chip, then it will not install. It is that simple. Since the personal computers come in 2 forms (14″ and 16″ notebooks), they will be easier to identify and work with.
When the owner turns on the computer for the first time, they will be introduced to the setup policy. The first thing they will provide is their name. This will be assigned as the computer owner. Also, the surname will be added to the spell checker to make it easy to not deal with. The owner will then setup their UID within the computer. They will also provide their Kaldan NIN if they have one. If they don’t, it is OK as it can be added later in the Settings. The owner will not be able to use some of the more advanced services such as Kal-Drive, or Kal-Media. Next, they will define if they want the second NVME drive as the user’s drive. The second drive can also be used as a RAID drive if the drives are the same capacity. If the 2280 drive is larger in capacity than the 2230 drive, and the owner wants RAID, then the setup process will partition the drive to make the excess space look like a second drive. This is because with RAID, you would see only 1 drive even though multiple drives are in use. If something physically happens to the 2280 drive, then all files will be lost.
Assuming the owner added their NIN to the system, they will be able to select if they wish to activate any services. A couple of services may not be available for those outside of Kaldus, and the user’s IP address will be submitted along with the setup process. Kal-Drive for example will be available, but Kal-Stamps will not be available. Once all of the options are made, the computer will go through the process of activating the system, and downloading any updates. Sentinel will then be activated, and the owner will answer a couple more questions detailing what the computer will be used for. This will determine how the firewall will behave. For example, a personal computer will have different firewall requirements than a PBX server.
Once all of that is done, it would be time for more personal touches. Background colors or images, the mouse pointer, and authentication will be done. This will be the final process, and it would be assumed that the process will take about 30 minutes. That would be all. There will be no ads, and no nagging programs to interfere with your system. If the owner inserts an SD card into the slot, then the top left of the screen will show A: in the top, and the owner can select that drive to view contents. There will be a Computer icon and selecting it will popup with all of the logical drives on the system. This will include not only local drives, but networked, and online drives as well.